36%
05.12.2019
Since Satya Nadella took over the helm of Microsoft in 2014, Redmond's aversion to Linux and open source software in general has given way to a new openness. As a result, Linux virtual machines (VMs
36%
30.01.2020
-transport-https curl
# curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | apt-key add -
# cat </etc/apt/sources.list.d/kubernetes.list
deb https://apt.kubernetes.io/ kubernetes-xenial main
EOF
# apt
36%
30.01.2020
" – required a complete revision of the STUN concept on the basis of experience gained in practice. The new STUN (according to RFC 5389 [4]) is now just a mechanism used in conjunction with other specifications
36%
09.04.2019
, including the new S3 Select, Amazon Athena, or Amazon Redshift Spectrum.
With S3 Select and AWS Lambda, you can even create serverless apps that use direct processing of S3 Select. Amazon Athena
36%
07.06.2019
's popular images and listed on the CVE website [1] might surprise you.
According to a new report from the venerable Snyk [2], who knows about all things security focused, the top 10 most popular container
36%
07.06.2019
Kubernetes [1] is king of the hill in the orchestration universe. Invented by Google and now under the auspices of the Linux Foundation, Kubernetes has not only blossomed quickly but has led
36%
10.06.2015
with many features or an open source implementation at zero cost. In this article, I describe a new, third variant: analysis of traffic data from the cloud. A NetFlow collector local to the company collects ... The free Google Analytics is a convenient way to analyze website usage; but, with a few minor modifications, the service can also be used for simple evaluations of any data traffic on the company ... NetFlow and Google Analytics ... NetFlow reporting with Google Analytics
36%
09.08.2015
, you can also check the debugging output:
spamassassin --lint -D
The spam filter update mechanism sa-update makes sure SpamAssassin always uses the most current rules and updates. New rules can
36%
20.05.2014
not have to relearn the ropes completely.
On the other hand, the various new protocol components and communication types in IPv6 pose challenges for firewall administrators. In this article, I only address
36%
25.03.2020
with identified signatures. With the progress made in machine learning over the past few years, efforts have been made to generate new signatures automatically with artificial intelligence (AI) and to enter them